Joe, a user, wants to send an encrypted email to Ann. Which of the following will Ann need to use
to verify that the email came from Joe and decrypt it? (Select TWO).
A.
The CA’s public key
B.
Ann’s public key
C.
Joe’s private key
D.
Ann’s private key
E.
The CA’s private key
F.
Joe’s public key
Joe, a user, wants to send an encrypted email to Ann. Which of the following will Ann need to use
to verify that the email came from Joe and decrypt it? (Select TWO).
I thought you needed the CA’s public key to verify integrity. I need more understanding regarding keys and purpose.
I think you should read how PGP is used to secure email. It uses asymmetric and symmetric cryptography. In other words you should have a public and private key pair and a shared secret (session key, private key or secret key). I believe Ann’s private key is the shared-secret.
you encrypt the email with your own private key and you include a public key with it. The receiver use the public key to verify integrity of the email’s sender and private key to decrypt the email.